Sciweavers

IACR
2016
52views Biometrics» more  IACR 2016»
10 years 1 months ago
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Abstract: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resourceconstrained...
Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
Linguistic Cracking of Passphrases Using Markov Chains
In order to remember long passwords, it is not uncommon users are recommended to create a sentence which then is assembled to form a long password, a passphrase. However, theoretic...
Peder Sparell, Mikael Simovits
IACR
2016
36views Biometrics» more  IACR 2016»
10 years 1 months ago
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
A (γ, δ)-elastic channel is a binary symmetric channel between a sender and a receiver where the error rate of an honest receiver is δ while the error rate of a dishonest recei...
Ignacio Cascudo, Ivan Damgård, Felipe Lacerd...
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
Constant-Round Asynchronous Multi-Party Computation
Secure multi-party computation (MPC) allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In synchrono...
Sandro Coretti, Juan A. Garay, Martin Hirt, Vassil...
IACR
2016
40views Biometrics» more  IACR 2016»
10 years 1 months ago
Process Table Covert Channels: Exploitation and Countermeasures
How to securely run untrusted software? A typical answer is to try to isolate the actual effects this software might have. Such counter-measures can take the form of memory segmen...
Jean-Michel Cioranesco, Houda Ferradi, Rémi...